FileMood

Download CISA Certified Information Systems Auditor

CISA Certified Information Systems Auditor

Name

CISA Certified Information Systems Auditor

 DOWNLOAD Copy Link

Total Size

7.7 GB

Total Files

190

Last Seen

2024-11-17 23:58

Hash

4F5DD1EF5DF1F82F3486A587F3DA7AF66DFA7B06

/Chapter 2 Information System Auditing Process/

004. Business Process Applications and Controls.mp4

144.1 MB

001. Exam Overview.en.srt

19.8 KB

001. Exam Overview.mp4

75.3 MB

002. Standards, Guidelines, and Professional Ethics.en.srt

23.8 KB

002. Standards, Guidelines, and Professional Ethics.mp4

84.3 MB

003. IS Audit Functions.en.srt

41.6 KB

003. IS Audit Functions.mp4

129.8 MB

004. Business Process Applications and Controls.en.srt

48.1 KB

005. Control Types.en.srt

33.8 KB

005. Control Types.mp4

111.9 MB

006. Risk and Audit Planning.en.srt

27.9 KB

006. Risk and Audit Planning.mp4

83.1 MB

007. Project Management and Auditing.en.srt

36.8 KB

007. Project Management and Auditing.mp4

104.0 MB

008. Sampling Methodologies.en.srt

22.0 KB

008. Sampling Methodologies.mp4

61.2 MB

009. Collecting Evidence.en.srt

19.2 KB

009. Collecting Evidence.mp4

62.3 MB

010. Data Analytics and CAATs.en.srt

19.1 KB

010. Data Analytics and CAATs.mp4

59.5 MB

011. Continuous Auditing.en.srt

16.3 KB

011. Continuous Auditing.mp4

46.6 MB

012. How to Communicate the Audit Results.en.srt

34.2 KB

012. How to Communicate the Audit Results.mp4

112.0 MB

013. Quality Assurance and Improving Audit.en.srt

19.0 KB

013. Quality Assurance and Improving Audit.mp4

58.3 MB

/Chapter 1 Course Overview/

001. Course Overview.mp4

33.9 MB

001. Course Overview.en.srt

8.8 KB

/Chapter 3 Governance and Management of IT/

001. What is Governance.en.srt

19.3 KB

001. What is Governance.mp4

61.2 MB

002. Best Practices for Enterprise Governance in IT.en.srt

27.5 KB

002. Best Practices for Enterprise Governance in IT.mp4

86.7 MB

003. Business Intelligence and Strategic Planning.en.srt

29.8 KB

003. Business Intelligence and Strategic Planning.mp4

84.8 MB

004. IT Standards, Policies and Procedures.en.srt

18.2 KB

004. IT Standards, Policies and Procedures.mp4

60.9 MB

005. Organizational Structures.en.srt

19.3 KB

005. Organizational Structures.mp4

57.8 MB

006. Roles and Segregation of Duties.en.srt

44.0 KB

006. Roles and Segregation of Duties.mp4

131.0 MB

007. Risk Management in the Enterprise.en.srt

20.9 KB

007. Risk Management in the Enterprise.mp4

60.5 MB

008. Risk Analysis.en.srt

13.4 KB

008. Risk Analysis.mp4

48.0 MB

009. Maturity Models.en.srt

17.9 KB

009. Maturity Models.mp4

66.5 MB

010. The Role of Industry Standards and Regulations.en.srt

23.8 KB

010. The Role of Industry Standards and Regulations.mp4

83.5 MB

011. Resource Management in IT.en.srt

19.3 KB

011. Resource Management in IT.mp4

70.9 MB

012. Human Resource Management.en.srt

27.3 KB

012. Human Resource Management.mp4

100.5 MB

013. Organizational Change Management and Financial Management.en.srt

19.5 KB

013. Organizational Change Management and Financial Management.mp4

72.2 MB

014. IT Service Provider Acquisition and Management.en.srt

36.8 KB

014. IT Service Provider Acquisition and Management.mp4

121.2 MB

015. Governance in the Cloud.en.srt

14.6 KB

015. Governance in the Cloud.mp4

58.8 MB

016. Third-party Services.en.srt

23.2 KB

016. Third-party Services.mp4

74.1 MB

017. Quality Assurance and IT Audits.en.srt

21.9 KB

017. Quality Assurance and IT Audits.mp4

73.5 MB

018. Performance Monitoring and Reporting.en.srt

19.6 KB

018. Performance Monitoring and Reporting.mp4

56.8 MB

/Chapter 4 Information Systems Acquisition, Development and Implementation/

001. Project Governance and Management.en.srt

17.3 KB

001. Project Governance and Management.mp4

60.3 MB

002. Roles in Project Management.en.srt

19.7 KB

002. Roles in Project Management.mp4

64.2 MB

003. The PMO.en.srt

19.5 KB

003. The PMO.mp4

73.3 MB

004. Initiating the Project.en.srt

16.0 KB

004. Initiating the Project.mp4

52.9 MB

005. Planning the Project.en.srt

27.2 KB

005. Planning the Project.mp4

85.9 MB

006. Executing and Monitoring the Project.en.srt

16.1 KB

006. Executing and Monitoring the Project.mp4

50.9 MB

007. Closing the Project.en.srt

23.7 KB

007. Closing the Project.mp4

80.1 MB

008. Business Case and Feasibility Analysis.en.srt

20.7 KB

008. Business Case and Feasibility Analysis.mp4

70.8 MB

009. System Development Lifecycles.en.srt

33.6 KB

009. System Development Lifecycles.mp4

98.5 MB

010. System and Software Development Methods.en.srt

29.8 KB

010. System and Software Development Methods.mp4

85.7 MB

011. Computer Aided Software Engineering and 4GL.en.srt

22.2 KB

011. Computer Aided Software Engineering and 4GL.mp4

70.6 MB

012. Identifying and Designing Controls.en.srt

44.4 KB

012. Identifying and Designing Controls.mp4

124.8 MB

013. Decision Support Systems.en.srt

20.6 KB

013. Decision Support Systems.mp4

62.8 MB

014. Testing Methodologies.en.srt

28.0 KB

014. Testing Methodologies.mp4

87.0 MB

015. Application Systems and Data Integrity Testing.en.srt

29.9 KB

015. Application Systems and Data Integrity Testing.mp4

99.7 MB

016. Data Migration.en.srt

27.8 KB

016. Data Migration.mp4

95.2 MB

017. Changeover Techniques.en.srt

24.8 KB

017. Changeover Techniques.mp4

86.8 MB

018. System Change and Post Implementation Procedures.en.srt

23.5 KB

018. System Change and Post Implementation Procedures.mp4

78.6 MB

/Chapter 5 Information Systems Operations and Business Resiliency/

001. Necessary Technology Components.en.srt

19.0 KB

001. Necessary Technology Components.mp4

59.5 MB

002. USB and RFID.en.srt

32.5 KB

002. USB and RFID.mp4

116.9 MB

003. IT Asset Management.en.srt

20.2 KB

003. IT Asset Management.mp4

72.8 MB

004. System Interfaces and End User Computing.en.srt

25.6 KB

004. System Interfaces and End User Computing.mp4

101.1 MB

005. Data Governance.en.srt

24.3 KB

005. Data Governance.mp4

81.0 MB

006. Operating Systems.en.srt

20.2 KB

006. Operating Systems.mp4

65.8 MB

007. Software Licensing and Source Code Management.en.srt

29.8 KB

007. Software Licensing and Source Code Management.mp4

90.2 MB

008. Incident and Problem Management.en.srt

34.0 KB

008. Incident and Problem Management.mp4

110.1 MB

009. Release and Patch Management.en.srt

19.7 KB

009. Release and Patch Management.mp4

60.4 MB

010. Service Level Management and Agreements.en.srt

17.6 KB

010. Service Level Management and Agreements.mp4

51.6 MB

011. Database Management.en.srt

27.5 KB

011. Database Management.mp4

70.0 MB

012. Business Impact Analysis.en.srt

29.0 KB

012. Business Impact Analysis.mp4

77.9 MB

013. System Resiliency.en.srt

27.1 KB

013. System Resiliency.mp4

70.7 MB

014. Backups, Storage and Restoration.en.srt

35.8 KB

014. Backups, Storage and Restoration.mp4

103.4 MB

015. Business Continuity Management.en.srt

31.4 KB

015. Business Continuity Management.mp4

105.7 MB

016. The Business Continuity Plan.en.srt

28.7 KB

016. The Business Continuity Plan.mp4

88.3 MB

017. Testing the BCP.en.srt

26.3 KB

017. Testing the BCP.mp4

73.6 MB

018. Disaster Recovery Plans.en.srt

35.8 KB

018. Disaster Recovery Plans.mp4

111.2 MB

019. Testing the DRP.en.srt

17.9 KB

019. Testing the DRP.mp4

56.3 MB

/Chapter 6 Protection of Information Assets/

001. Frameworks, Standards and Guidelines.en.srt

29.3 KB

001. Frameworks, Standards and Guidelines.mp4

112.3 MB

002. Roles and Responsibilities for Auditing the IS Management Framework.en.srt

22.0 KB

002. Roles and Responsibilities for Auditing the IS Management Framework.mp4

74.7 MB

003. Recommended IT Security Baseline.en.srt

31.0 KB

003. Recommended IT Security Baseline.mp4

107.8 MB

004. Principles of Data Privacy.en.srt

29.8 KB

004. Principles of Data Privacy.mp4

97.3 MB

005. Physical Access and Controls.en.srt

39.8 KB

005. Physical Access and Controls.mp4

132.0 MB

006. Environmental Controls.en.srt

26.4 KB

006. Environmental Controls.mp4

96.5 MB

007. Identity and Access Management.en.srt

17.7 KB

007. Identity and Access Management.mp4

64.3 MB

008. Logical Access and Authorization Issues.en.srt

40.4 KB

008. Logical Access and Authorization Issues.mp4

124.6 MB

009. Audit Logging of System Access.en.srt

31.4 KB

009. Audit Logging of System Access.mp4

95.6 MB

010. Data Loss Prevention.en.srt

20.1 KB

010. Data Loss Prevention.mp4

51.1 MB

011. Network Infrastructure.en.srt

30.3 KB

011. Network Infrastructure.mp4

78.0 MB

012. Applications in a Networked Environment.en.srt

15.9 KB

012. Applications in a Networked Environment.mp4

39.6 MB

013. Network Infrastructure Security Firewalls.en.srt

36.7 KB

013. Network Infrastructure Security Firewalls.mp4

128.4 MB

014. Change Management in Networks.en.srt

27.6 KB

014. Change Management in Networks.mp4

81.6 MB

015. Encryption Systems.en.srt

24.5 KB

015. Encryption Systems.mp4

66.0 MB

016. Applications of Cryptography.en.srt

17.6 KB

016. Applications of Cryptography.mp4

47.3 MB

017. The Public Key Infrastructure.en.srt

17.9 KB

017. The Public Key Infrastructure.mp4

46.4 MB

018. IS Audits and Social Media.en.srt

16.3 KB

018. IS Audits and Social Media.mp4

50.7 MB

019. Virtualization and Cloud Computing.en.srt

17.4 KB

019. Virtualization and Cloud Computing.mp4

58.5 MB

020. Security Awareness Training.en.srt

21.9 KB

020. Security Awareness Training.mp4

67.5 MB

021. IS Attack Methods and Techniques.en.srt

43.6 KB

021. IS Attack Methods and Techniques.mp4

117.7 MB

022. Testing Techniques for Security Controls.en.srt

16.8 KB

022. Testing Techniques for Security Controls.mp4

45.3 MB

023. Network Penetration Testing.en.srt

40.6 KB

023. Network Penetration Testing.mp4

94.6 MB

024. Monitoring Tools.en.srt

30.6 KB

024. Monitoring Tools.mp4

80.0 MB

025. Incident Response Management.en.srt

42.3 KB

025. Incident Response Management.mp4

98.1 MB

026. Evidence Collection and Forensics.en.srt

39.1 KB

026. Evidence Collection and Forensics.mp4

101.9 MB

 

Total files 190


Copyright © 2024 FileMood.com